recentpopularlog in

Quercki : security   47

The voting machines that local officials swore were not connected to the internet have been connected to the internet for years / Boing Boing
ots of election officials, including many in heavily contested districts that have determined the outcomes of national elections (cough Florida cough) just leave their machines connected to the internet all the time, while denying that this is the case, possibly because they don't know any better.

A team of ten leading security experts, including some affiliated with NIST's election cybersecurity efforts, have used internet-wide scanning to locate dozens of these systems, live on the internet, and because it's the internet, they're not even sure who all of them belong to, and can't alert the relevant officials. Many of these systems have been online for months; some have likely been online for years.

ES&S has downplayed the risk, using incredibly misleading definitions of "not connected to the internet" (for example, insisting that "behind a firewall" is the same thing as "airgapped"). The company's account of its security best practices, training and maintenance are belied by their own public documents as well as authenticated whistleblower's accounts.

In one case -- Rhode Island -- it appears that every vote cast in the state is tallied on a single system that is often available on the internet.
election  security  risk 
10 weeks ago by Quercki
(Don't) Return to Sender: How to Protect Yourself From Email Tracking | Electronic Frontier Foundation
For users, there are usually ways to “opt out” of tracking within your email client of choice. For mail client developers, including a few simple features can help protect your users’ privacy by default. And if you’re at an organization that does perform tracking, you can take a proactive approach to respecting user privacy and consent. Here are some friendly suggestions to help make tracking less pervasive, less creepy, and less leaky.
email  tracking  marketing  privacy  security 
january 2019 by Quercki
How to Quit Google Completely
If you’re ready to ditch Google, or even just reduce its presence in your digital life, this guide is here to help.

Since Google owns some of the best and most-used apps, websites, and internet services, making a clean break is difficult—but not impossible. We’re going to take a look at how to leave the most popular Google services behind, and how to keep Google from tracking your data. We’ve also spent serious time researching and testing great alternatives to Google’s offerings, so you can leave the Big G without having to buy new devices or swear fealty to another major corporation.
privacy  security  Google  internet  howto 
december 2018 by Quercki
Summary: Actuarial Status of the Social Security Trust Funds
The annual report of the Social Security Board of Trustees details the actuarial status of the Old-Age and Survivors Insurance (OASI) and Disability Insurance (DI) Trust Funds. The table below outlines key measures of the actuarial status of the trust funds under the intermediate assumptions in the 2018 report.
Social  Security  retirement  annual  report  statistics 
november 2018 by Quercki
Georgia Election Server Wiped After Lawsuit Filed
Wiping the server clean "forestalls any forensic investigation at all," said Richard DeMillo, a Georgia Tech computer scientist who has closely followed the case. "People who have nothing to hide don't behave this way."

The server data could have revealed whether Georgia's most recent elections were compromised by malicious hackers. The plaintiffs contend that the results of both last November's election and a special June 20 congressional runoff— won by Kemp's predecessor, Karen Handel — cannot be trusted.

Possible Russian interference in U.S. politics, including attempts to penetrate voting systems, has been an acute national preoccupation since the Obama administration first sounded the alarm more than a year ago.

Kemp and his GOP allies insist Georgia's elections system is secure. But Marilyn Marks, executive director of the Coalition for Good Governance, a plaintiff, believes the server data was erased precisely because the system isn't secure.
election  security  Georgia  voting  records  wiped  Russia 
july 2018 by Quercki
Congressional candidate Brianna Wu explains Net Neutrality with cookies / Boing Boing
Frank Wu writes, "Brianna Wu, progressive Democrat and cybersecurity expert, is running for Congress in Massachusetts District 8. She has just released a set of three short videos to explain three complex technical issues."

Net Neutrality is explained with cookies.

Laws criminalizing cybersecurity research are explained with dinosaurs.

And the need for cybersecurity laws is explained in one super-complicated chart.

Right now the US is under attack by hackers who are trying to steal your social security number and drain your bank account, and those who are trying to undermine our democracy and threaten the security of our nuclear power plants. The US Congress is doing nothing about this, partially because they don't understand these tech issues. And partially because too many politicians are in the pocket of big telecom companies. Brianna Wu is a software engineer, so she understands these issues, and she is not taking a dollar from big telecom, because she doesn't represent big telecom.
politicians  Net_Neutrality  internet  cyber  security 
may 2018 by Quercki
Signal >> Home
Free for everyone

Signal is made for you. As an Open Source project supported by grants and donations, Signal can put users first. There are no ads, no affiliate marketers, no creepy tracking. Just open technology for a fast, simple, and secure messaging experience. The way it should be.
open_source  encryption  communication  security  privacy 
may 2018 by Quercki
“The Mafia White House”: My no-holds-barred interview on The Rick Smith Show | Sarah Kendzior
the news, especially surrounding Kushner: here’s a guy who now evidently has almost no security clearance, but he was ‘top secret’ clearance, and we have no idea what he did with classified information.  And I pose this to some of my conservative acquaintances—they were just losing their mind over Hillary Clinton and the damn emails—and I go ‘Well what about this administration, with all of these people having access to classified information that haven’t gone through the background checks, that can’t pass a background check.
...
Because what you have is a bunch of former Trump employees who are just roaming free, loaded with classified information that they shouldn’t have had access to to begin with. They don’t have loyalty to country, they need to make money, and there is a rich marketplace out there for selling state secrets. And I don’t know why they wouldn’t do it. These are exactly the kind of people who would do it, because they’re the kind of people who are willing to work for Donald Trump while aware that he’s compromised by the Kremlin. So we’re in a very dangerous situation, because even if people leave the White House, that kind of information and that kind of jeopardization of national security is going to have effects for years, if not decades.
Trump  Kushner  secret  security  politics  corruption 
march 2018 by Quercki
Free and Responsible Search: Who Owns the World?
By the time he writes Agrarian Justice, Paine has already played his role in the American Revolution, has gotten himself thrown out of England for preaching revolution there, and is in Paris trying to keep the French Revolution from going off the rails. Agrarian Justice is his proposal to the English, that they should give each young adult (of either gender) a stake of capital to get started in the world, and also establish an old-age pension, and that it should all be funded by an inheritance tax -- or (as Beck might say) a death tax.
solution  economy  justice  social  security  adult  capitalism  Paine 
february 2018 by Quercki
Academic Outrage: When The Culture Wars Go Digital – tressiemc
What about the scholars who violate the assumptions of expertise by being a woman, or gender-queer, or brown or black or working in a language other than English?

For those scholars, public engagement is far more combative, risky and fraught than it is for those other folks.
internet  culture  security  doxxing 
july 2017 by Quercki
EQUALITY LABS
DIGITAL SELF-DEFENSE IN THE TIME OF TRUMP
Welcome! Below is a series of curriculum and one sheets  to help activists around the US help better prepare to protect their privacy rights during the Trump Administration. We encourage you to download the guides and adopt the processes individually and with each other in your community.

If you do not have time to do the full curriculum we will have one-sheets for particular areas you can focus on so you can adopt good digital safety practices as you grow

EQUALITY LABS IS A SOUTH ASIAN AMERICAN HUMAN RIGHTS START-UP WORKING AT THE INTERSECTION OF STORY, ART, AND SECURITY. WE SUPPORT MOVEMENTS DEALING WITH INTRACTABLE SYSTEMS OF OPPRESSION THROUGH A COLLABORATIVE MODEL THAT CONNECTS MULTIPLE DISCIPLINES AND PLATFORMS TO MAXIMIZE POTENTIAL FOR CHANGE AND ENGENDER WORKABLE, COMMUNITY DRIVEN SOLUTIONS TO THE MOST PRESSING CHALLENGES WE FACE. WE ARE ALSO THE FIRST SOUTH WOMEN, GENDER NON CONFORMING, AND TRANS TECHNOLOGY COLLECTIVE WHOSE LEADERSHIP IS FROM SOUTH ASIAN CULTURAL AND RELIGIOUS MINORITY COMMUNITIES. THIS INCLUDES DALITS, ADIVASIS, MUSLIMS, BUDDHISTS, AND CHRISTIANS.
security  activism  diversity 
july 2017 by Quercki
Errata Security: How The Intercept Outed Reality Winner
The document posted by the Intercept isn't the original PDF file, but a PDF containing the pictures of the printed version that was then later scanned in.

The problem is that most new printers print nearly invisibly yellow dots that track down exactly when and where documents, any document, is printed. Because the NSA logs all printing jobs on its printers, it can use this to match up precisely who printed the document.
whistleblower  security  surveillance 
june 2017 by Quercki
Security in a Box - Digital security tools and tactics
SECURITY IN A BOX - DIGITAL SECURITY TOOLS AND TACTICS

If you're new to digital security, the Tactics Guides cover the basic principles, including advice on how to use social networking platforms and mobile phones more safely. The Tool Guides offer step-by-step instructions to help you install and use the most essential digital security software and services.

The Community Guides focus on specific groups of people — sometimes in specific regions — who face severe digital threats. They include tailored advice on tools and tactics that are relevant to the needs of these particular groups.
security  privacy  digital  tools  todo 
may 2017 by Quercki
Cybersecurity for the People: How to Protect Your Privacy at a Protest
April 21 2017, 11:17 a.m.
PLANNING ON GOING to a protest? You might not be aware that just by showing up, you can open yourself up to certain privacy risks — police often spy on protesters, and the smartphones they carry, and no matter how peaceful the demonstration, there’s always a chance that you could get detained or arrested, and your devices could get searched. Watch this video for tips on how to prepare your phone before you go to a protest, how to safely communicate with your friends and document the event, and what to do if you get detained or arrested.

This is the first in a new series of videos I’m hosting called Cybersecurity for the People. In future videos we’ll dive into topics such as encrypted messaging apps, password management, and how to become a whistleblower. If you have topics that you’d like to see covered in this series, please let me know. You can email me at micah.lee@theintercept.com or send me a Signal message at 415-964-1601.
protest  demonstration  security  mobile  phone 
may 2017 by Quercki
Another way the rich get richer: Study shows a widening gap in life expectancy between rich and poor - LA Times
one of the most oft-proposed nostrums for “fixing” Social Security’s fiscal problem — raising the retirement age — translates into a benefit cut, disproportionately hurting the middle class and the poor. The National Academy of Sciences calculated in 2015 that raising the official retirement age to 70 (it’s 66 for those born in 1943-54) would reduce the benefits of those in the lowest fifth of income earners by 25%, but only 20% for those in the top fifth of the income ladder.
social  security  poor  wealth 
may 2017 by Quercki
iSpy - Uses and Features
Nanny Cams Do you have any suspicions about your nanny? You could setup iSpy to monitor both a microphone and camera in your home and trigger recording of both the video and audio on loud noises - so if your children (or the nanny!) starts screaming you'll have it all on tape!
security  camera  programming 
may 2017 by Quercki
How hackers turned a Cape Cod fishing guide’s site into a host for e-commerce fraud | TechCrunch
In case you’re wondering, Eric’s site has 130 web pages, most of which feature a picture of an impressive striped bass caught off Falmouth on Cape Cod.

It appears that the hackers were using the malware to insert links in Eric’s site and using the site map to create some kind of dynamic set of redirects. But that’s just a guess, and there may be a better explanation.

Neither of us was crazy about following the links. The hacker had created more than 47 separate sitemaps using links/redirects from the site — all averaging 70,000 lines of code each (that’s a lot of URLs!) The URLs all looked similar in their format:
website  WordPress  security  howto 
march 2017 by Quercki
(59) Are You Secure?
Are you secure? Your online activity is easily traceable. Every website, every search, every email, every post, every piece of data you have stored in the Cloud . . . all readable. Before Obama left office, he loosened privacy laws even further, allowing the government to view your information. With a facist authoritarian regime now in power, your information can be used against you and those you communicate with online. Do something about that, okay? There are a few steps involved. It's worth your time, effort and dollars:
1. Install Signal on your phone. It's a free text messaging app that works with all systems.
todo  security 
february 2017 by Quercki
Twitter Activist Security – Medium
The basic principles of operational security are actually very simple, they’re what we call the three Cs:
Cover
Concealment
Compartmentation
There is more to serious counterintelligence, of course, but keep these three concepts in mind. The two most important concerns will be compartmentation and concealment. In practice this means that you need to separate your resistance Twitter account from your personal life completely.
Compartmentation Rules
Do — create a new unique email address specifically, and only, for this Twitter account. There are a lot of options here, but seriously consider using SIGAINT or another non-US service. Always use Tor when accessing this account, never use it for anything except your resistance Twitter. Compartment!
Do — Twitter is a total bitch about collecting phone numbers these days, making it very hard to use without supplying something. You’ll need a burner phone, or to get a disposable VoIP number (I don’t recommend Google Voice because it is vulnerable to a state level adversary, other services might be as well.)
Do — Use Tor for creating your Twitter account, and all access to the Twitter account. The IP address, along with cookies and other trackers, will be available to Twitter (and potentially investigative journalists / media.)
Don’t — Use your smartphone Twitter app for the account. The IP address will be directly linked to your phone account and you’ll be at high risk of exposure via technical means. If you must use Twitter on your phone, make it a dedicated phone only for that account with no additional information on it (such as personal contacts, photos, etc.) Additionally, it is a good idea to use Tor (Orbot) on an Android phone, or a VPN (Algo, if you’re technical; Freedome if you’re not) to minimise your exposure.
Don’t — respond to DMs or direct replies, particularly if there is a URL (which can be used to capture your IP address) or to exploit your device. Seriously, don’t click on links that are sent to you via @ or DM, particularly if they’re behind a URL shortener, but just don’t do it. (It is worth pointing out that all URLs on Twitter are redirected through Twitter’s own t.co shortener and analytics, so even a “safe URL” from a known and trusted confidant will expose the IP of the account that clicks it.)
twitter  anonymous  security 
january 2017 by Quercki
Digital Security Tips for Protesters | Electronic Frontier Foundation
After the election, individuals took to the streets across the country to express their outrage and disappointment at the result of the U.S. presidential election. Many protesters may not be aware of the unfortunate fact that exercising their First Amendment rights may open themselves up to certain risks. Those engaging in peaceful protest may be subject to search or arrest, have their movements and associations mapped, or otherwise become targets of surveillance and repression. It is important that in a democracy citizens exercise their right to peaceably assemble, and demonstrators should be aware of a few precautions they can take to keep themselves and their data safe. Here we present 10 security tips for protesting in the digital age.
politics  activism  protest  privacy  security  EFF 
january 2017 by Quercki
DIY Feminist Cybersecurity
You have a right to exist safely in digital spaces. Although we have to rely on outside parties for technology to access these spaces, there are tons of helpful tools and strategies that allow you to take greater control of your digital life and mitigate the risk of malicious threats. We’ll walk through common areas of digital life such as web browsing, private data, and smartphones to show you different ways that you can implement as much or little security as you’re comfortable with. You have power to set boundaries and protections in your digital spaces as you see fit: we hope that this guide will help you to make informed, personal decisions on what is right for you.

How to use this guide


This guide is intended to be a comprehensive and accessible introduction to some of the most valuable cybersecurity tools available. There’s a lot of information here, so it can get a bit overwhelming! Feel free to read each section at your own pace: there’s no obligation to read through the whole guide and install every piece of tech we recommend. Consider checking out our Cheat Sheet section as a quick way to get started with the tools that best meet your digital security needs. Don’t worry if some of the tech is a bit confusing: even experienced techies can get a bit disoriented at first, but rarely do you need to know every inner-working of a tool in order to take advantage of it. If at any point you have questions or concerns, feel free to tweet this guide’s creator at @ciakraa or email at noah@hackblossom.org and he will try to help as quickly as he can!
feminism  security  howto  internet 
january 2017 by Quercki
Attending Protests (United States) | Surveillance Self-Defense
Attending Protests (United States)

With the proliferation of personal technologies, protesters of all political persuasions are increasingly documenting their protests—and encounters with the police—using electronic devices like cameras and mobile phones. In some cases, getting that one shot of the riot police coming right at you posted somewhere on the Internet is an exceptionally powerful act and can draw vital attention to your cause.

The following are useful tips for you to remember if you find yourself at a protest and are concerned about protecting your electronic devices if or when you’re questioned, detained, or arrested by police. Remember that these tips are general guidelines, so if you have specific concerns, please talk to an attorney.
selfdefense  security  safety  protests  demonstration 
november 2016 by Quercki
How the Trump Organization's Foreign Business Ties Could Upend U.S. National Security
Never before has an American candidate for president had so many financial ties with American allies and enemies, and never before has a business posed such a threat to the United States. If Donald Trump wins this election and his company is not immediately shut down or forever severed from the Trump family, the foreign policy of the United States of America could well be for sale.
Trump  foreign  business  national  security  danger 
september 2016 by Quercki
What the stampede at JFK airport tells us about fear / Boing Boing
Travelers mishearing applause apparently triggered a full-scale "stampede" at JFK, complete with screaming crowds, people shouting about guns, and police running around aimlessly with weapons drawn. It was shut down for hours.

The fact that there was no attack at the center of it was both the weirdest and the scariest part — that an institution whose size and location and budget should make it a fortress, in a country that has spent 15 years focused compulsively on securing its airports, in a city with a terrifyingly competent anti-terror police unit, could be transformed into a scene of utter bedlam, stretching out from all eight terminals across the tarmac and onto the adjacent highways, by the whisper of a threat. ...

For several hours, we were in the flood of panic and chaos of an ongoing act of terror. There’s no other way to describe it. That it was an overreaction almost doesn’t matter; in fact, that is how terrorism works.

Hysterical fear was always the invisible counterweight to security theater. Each is as real as the other.
TSA  terrorism  Olympics  fear  security  theater 
august 2016 by Quercki
Read Hillary Clinton’s Speech on Donald Trump and National Security | TIME
I have some experience with the tough calls and the hard work of statecraft. I wrestled with the Chinese over a climate deal in Copenhagen, brokered a ceasefire between Israel and Hamas, negotiated the reduction of nuclear weapons with Russia, twisted arms to bring the world together in global sanctions against Iran, and stood up for the rights of women, religious minorities and LGBT people around the world.
[Applause]
And I have, I have sat in the Situation Room and advised the President on some of the toughest choices he faced.
So I’m not new to this work. And I’m proud to run on my record, because I think the choice before the American people in this election is clear.
Hillary  foreign  policy  war  peace  military  national  security 
june 2016 by Quercki
Decoding Social Security Numbers in One Step
Decoding Social Security Numbers in One Step
(for numbers issued prior to June 25, 2011)

Stephen P.Morse, San Francisco




Three-Digit Decoder

SSN starting with - XX - XXXX
was issued in
Where card was issued, not where person was born



Five-Digit Decoder

SSN starting with - - XXXX
was issued in 001-01: New Hampshire, 1936-1950
Where and when card was issued, not where and when person was born



State/Year Decoder

In the year     the state of
issued SSN 416-01-XXXX
social  security  number  decoder 
january 2016 by Quercki
Revealed: How DOJ Gagged Google over Surveillance of WikiLeaks Volunteer
The Obama administration fought a legal battle against Google to secretly obtain the email records of a security researcher and journalist associated with WikiLeaks.

Newly unsealed court documents obtained by The Intercept reveal the Justice Department won an order forcing Google to turn over more than one year’s worth of data from the Gmail account of Jacob Appelbaum (pictured above), a developer for the Tor online anonymity project who has worked with WikiLeaks as a volunteer. The order also gagged Google, preventing it from notifying Appelbaum that his records had been provided to the government.

The surveillance of Appelbaum’s Gmail account was tied to the Justice Department’s long-running criminal investigation of WikiLeaks, which began in 2010 following the transparency group’s publication of a large cache of U.S. government diplomatic cables.

According to the unsealed documents, the Justice Department first sought details from Google about a Gmail account operated by Appelbaum in January 2011, triggering a three-month dispute between the government and the tech giant. Government investigators demanded metadata records from the account showing email addresses of those with whom Appelbaum had corresponded between the period of November 2009 and early 2011; they also wanted to obtain information showing the unique IP addresses of the computers he had used to log in to the account.

The Justice Department argued in the case that Appelbaum had “no reasonable expectation of privacy” over his email records under the Fourth Amendment, which protects against unreasonable searches and seizures.
email  leak  DOJ  Homeland_Security  security  secret  Gmail 
december 2015 by Quercki
Ryan Lizza: Why Won’t Obama Rein in the N.S.A.? : The New Yorker
Feinstein often uses the committee to bolster the tools that spy agencies say they need to protect the country, and Wyden has been increasingly concerned about privacy rights. For almost a decade, he has been trying to force intelligence officials like Clapper to be more forthcoming about spy programs that gather information about Americans who have no connection to terrorism.

Wyden had an uneasy kind of vindication in June, three months after Clapper’s appearance, when Edward Snowden, a former contractor at the N.S.A., leaked pages and pages of classified N.S.A. documents. They showed that, for the past twelve years, the agency has been running programs that secretly collect detailed information about the phone and Internet usage of Americans. The programs have been plagued by compliance issues, and the legal arguments justifying the surveillance regime have been kept from view. Wyden has long been aware of the programs and of the agency’s appalling compliance record, and has tried everything short of disclosing classified information to warn the public. At the March panel, he looked down at Clapper as if he were about to eat a long-delayed meal.


FROM THE ISSUEBUY AS A PRINTE-MAIL THIS
Wyden estimates that he gets about fifteen minutes a year to ask questions of top intelligence officials at open hearings.
government  privacy  security  surveillance 
december 2013 by Quercki
NSA Sent Home Talking Points for Employees to Use in Conversations with Family & Friends During Holidays | The Dissenter
Firedoglake obtained a copy of a two-page document that was sent out on November 22. It was clearly put together for rebutting statements about the NSA from news stories on documents disclosed by former NSA contractor and whistleblower Edward Snowden, and it encouraged employees to “share the following points with family members and close friends.”

The “talking points” sheet suggests that employees make five key points: (1) NSA’s mission is of great value to the Nation”; (2) NSA performs its mission the right way—lawful, compliant and in a way that protects civil liberties and privacy; (3) NSA performs its mission exceptionally well. We strive to be the best that we can be, because that’s what America requires as part of its defense in a dangerous world; (4) The people who work for NSA are loyal Americans with expert skills who make sacrifices to help protect the freedoms we all cherish; (5) NSA is committed to increased transparency, public dialog and faithful implementation of any changes required by our overseers. (No emphasis added. Underlines appear in the document.)
NSA  Homeland_Security  privacy  security  surveillance 
december 2013 by Quercki
How Boston Exposes America’s Dark Post-9/11 Bargain | Alternet
In America after 9/11, we made a deal with the devil, or with Dick Cheney, which is much the same thing. We agreed to give up most of our enumerated rights and civil liberties (except for the sacrosanct Second Amendment, of course) in exchange for a lot of hyper-patriotic tough talk, the promise of “security” and the freedom to go on sitting on our asses and consuming whatever the hell we wanted to. Don’t look the other way and tell me that you signed a petition or voted for John Kerry or whatever. The fact is that whatever dignified private opinions you and I may hold, we did not do enough to stop it, and our constitutional rights are now deemed to be partial or provisional rather than absolute, do not necessarily apply to everyone, and can be revoked by the government at any time.

The supposed tradeoff for that sacrifice was that we would be protected, at least for a while, from the political violence and terrorism and low-level warfare that is nearly an everyday occurrence in many parts of the world. According to the Afghan government, for example, a NATO air attack on April 6 killed 17 civilians in Kunar province, 12 of them children. We’ve heard almost nothing about that on this side of the world, partly because the United States military has not yet admitted that it even happened. But it’s not entirely fair to suggest that Americans think one kid killed by a bomb in Boston is worth more than 12 kids killed in Afghanistan. It’s more that we live in a profoundly asymmetrical world, and the dead child in Boston is surprising in a way any number of dead children in Afghanistan, horrifyingly enough, are not. He lived in a protected zone, after all, a place that was supposed to be sealed off from history, isolated from the blood and turmoil of the world. But of course that was a lie.

We are supposed to be protected, and then something like Boston comes along,
Homeland_Security  media  Boston  security 
april 2013 by Quercki
DHS Crushed This Analyst for Warning About Far-Right Terror | Danger Room | Wired.com
But Johnson’s career took an unexpected turn in 2009, when an analysis he wrote on the rise of “Right-Wing Extremism” (.pdf) sparked a political controversy. Under pressure from conservatives, the Department of Homeland Security (DHS) repudiated Johnson’s paper — an especially bitter pill for him to swallow now that Wade Michael Page, a suspected white supremacist, killed at least six people at a Sikh temple in Oak Creek, Wisconsin. For Johnson, the shooting was a reminder that the government’s counterterrorism efforts are almost exclusively focused on al-Qaida, even as non-Islamist groups threaten Americans domestically.

“DHS is scoffing at the mission of doing domestic counterterrorism, as is Congress,” Johnson tells Danger Room. “There’ve been no hearings about the rising white supremacist threat, but there’s been a long list of attacks over the last few years. But they still hold hearings about Muslim extremism. It’s out of balance.” But even if that balance was reset, he concedes, that doesn’t necessarily mean the feds could have found Page before Sunday’s rampage.
terrorism  security  gunman  right-wing 
august 2012 by Quercki
Biometric Door Locks and Bulletproof Windows: How Occupy Wall Street Is Scaring the Heck out of the 1% | | AlterNet
Apparently young activists standing up and calling “Shame on the 1 percent!” is scary enough for Sotheby's to increase its security.

The New York occupiers followed Governor Andrew Cuomo to a party hosted by the Huffington Post, and community groups working in solidarity with Occupy Wall Street hosted a tour of millionaires' homes in the city.
Occupy_Wall_Street  1%  security  fear 
november 2011 by Quercki
Should I Change My Password?
ShouldIChangeMyPassword.com has been created to help the average person check if their password(s) may have been compromised and need to be changed.

This site uses a number of databases that have been released by hackers to the public. No passwords are stored in the ShouldIChangeMyPassword.com database.
password  security 
june 2011 by Quercki
This Libertarian Radio Host Lied About TSA Harassment
Meg McClain, a New Hampshire libertarian activist, accused Transportation Security Administration screeners in Florida of handcuffing her, tearing up her ticket and screaming at her. In response, TSA released security video showing none of those things happening.
TSA  security  libertarian 
november 2010 by Quercki
Another TSA Outrage | RedState
TSA decided not to reinspect our Cargo–just to inspect us again: Soldiers on the way home from war, who had already been inspected, reinspected and kept in a SECURE holding area for 2 hours. Ok, whatever. So we lined up to go through security AGAIN.

This is probably another good time to remind you all that all of us were carrying actual assault rifles, and some of us were also carrying pistols.

So we’re in line, going through one at a time. One of our Soldiers had his Gerber multi-tool. TSA confiscated it. Kind of ridiculous, but it gets better. A few minutes later, a guy empties his pockets and has a pair of nail clippers. Nail clippers. TSA informs the Soldier that they’re going to confiscate his nail clippers
TSA  military  funny  terrorism  security 
november 2010 by Quercki
hpHosts Online - Simple, Searchable & FREE!
To use hpHosts Online, enter the hostname (e.g. myspace.com) or IP address (e.g. your IP address is 76.102.121.144) you are looking for into the search box above, and click Search!. If a match to the hostname or IP address is found, the results will be displayed to you.

If you would like to know WHY a particular website is listed, either click the classification associated with it (e.g. EMD) or, feel free to contact me.
security  internet 
november 2009 by Quercki

Copy this bookmark:





to read